Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

6,778 Full-Text Articles 9,203 Authors 3,518,326 Downloads 212 Institutions

All Articles in Databases and Information Systems

Faceted Search

6,778 full-text articles. Page 219 of 256.

Building A Computer Program To Support Children, Parents, And Distraction During Healthcare Procedures, Kirsten Hanrahan, Ann Marie Mccarthy, Charmaine Kleiber, Kaan Ataman, W. Nick Street, M. Bridget Zimmerman, Annel L. Ersig 2012 University of Iowa

Building A Computer Program To Support Children, Parents, And Distraction During Healthcare Procedures, Kirsten Hanrahan, Ann Marie Mccarthy, Charmaine Kleiber, Kaan Ataman, W. Nick Street, M. Bridget Zimmerman, Annel L. Ersig

Business Faculty Articles and Research

This secondary data analysis used data mining methods to develop predictive models of child risk for distress during a healthcare procedure. Data used came from a study that predicted factors associated with children's responses to an intravenous catheter insertion while parents provided distraction coaching. From the 255 items used in the primary study, 44 predictive items were identified through automatic feature selection and used to build support vector machine regression models. Models were validated using multiple cross-validation tests and by comparing variables identified as explanatory in the traditional versus support vector machine regression. Rule-based approaches were applied to the model …


Influentials, Novelty, And Social Contagion: The Viral Power Of Average Friends, Close Communities, And Old News, Nicholas HARRIGAN, Palakorn ACHANANUPARP, Ee Peng LIM 2012 Singapore Management University

Influentials, Novelty, And Social Contagion: The Viral Power Of Average Friends, Close Communities, And Old News, Nicholas Harrigan, Palakorn Achananuparp, Ee Peng Lim

Research Collection School Of Computing and Information Systems

What is the effect of (1) popular individuals, and (2) community structures on the retransmission of socially contagious behavior? We examine a community of Twitter users over a five month period, operationalizing social contagion as ‘retweeting’, and social structure as the count of subgraphs (small patterns of ties and nodes) between users in the follower/following network. We find that popular individuals act as ‘inefficient hubs’ for social contagion: they have limited attention, are overloaded with inputs, and therefore display limited responsiveness to viral messages. We argue this contradicts the ‘law of the few’ and ‘influentials hypothesis’. We find that community …


Talk Versus Work: Characteristics Of Developer Collaboration On The Jazz Platform, Subhajit DATTA, Renuka SINDHGATTA, Bikram SENGUPTA 2012 Singapore Management University

Talk Versus Work: Characteristics Of Developer Collaboration On The Jazz Platform, Subhajit Datta, Renuka Sindhgatta, Bikram Sengupta

Research Collection School Of Computing and Information Systems

IBM's Jazz initiative offers a state-of-the-art collaborative development environment (CDE) facilitating developer interactions around interdependent units of work. In this paper, we analyze development data across two versions of a major IBM product developed on the Jazz platform, covering in total 19 months of development activity, including 17,000+ work items and 61,000+ comments made by more than 190 developers in 35 locations. By examining the relation between developer talk and work, we find evidence that developers maintain a reasonably high level of connectivity with peer developers with whom they share work dependencies, but the span of a developer's communication goes …


The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali 2012 Old Dominion University

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali

Engineering Management & Systems Engineering Theses & Dissertations

This research explores the role that budget for Information System (IS) and technical expertise of healthcare service provider staff play on the successful leap from a partial to exhaustive implementation of Electronic Health Records (EHR) Systems. Technical expertise in Information Systems might not be easily measurable directly, but there are a number of indicators that could be used as a proxy, such as: Information System (IS) Department Budget, number of IS staff and the extent of technical trainings provided by the IS department to the clinical staff. This research study hypothesizes that quality technical trainings conducted by an IS department …


A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu LIU, Feida ZHU, Lei ZHANG, Shiqiang YANG 2012 Capital Medical University

A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang

Research Collection School Of Computing and Information Systems

Many web applications today thrive on offering services for large-scale multimedia data, e.g., Flickr for photos and YouTube for videos. However, these data, while rich in content, are usually sparse in textual descriptive information. For example, a video clip is often associated with only a few tags. Moreover, the textual descriptions are often overly specific to the video content. Such characteristics make it very challenging to discover topics at a satisfactory granularity on this kind of data. In this paper, we propose a generative probabilistic model named Preference-Topic Model (PTM) to introduce the dimension of user preferences to enhance the …


The Shanghai-Hongkong Team At Mediaeval2012: Violent Scene Detection Using Trajectory-Based Features, Yu-Gang JIANG, Qi DAI, Chun Chet TAN, Xiangyang XUE, Chong-wah NGO 2012 Singapore Management University

The Shanghai-Hongkong Team At Mediaeval2012: Violent Scene Detection Using Trajectory-Based Features, Yu-Gang Jiang, Qi Dai, Chun Chet Tan, Xiangyang Xue, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

The Violent Scene Detection task offers a very practical challenge in detecting complex and diverse violent video clips in movies. In this working note paper, we will briefly describe our system and discuss the results, which achieved top performance in mAP@201 and runner-up in mAP@100, among all 35 submissions worldwide. The central component of our system is a set of features derived from the appearance and motion of local patch trajectories [2]. We use these features and SVM classifier as the baseline approach and add in a few other components to further improve the performance. Our findings indicate that the …


Proceedings Of The Oss 2012 Doctoral Consortium, Klaas-Jan Stol, Charles M. Schweik, Imed Hammouda 2012 University of Massachusetts - Amherst

Proceedings Of The Oss 2012 Doctoral Consortium, Klaas-Jan Stol, Charles M. Schweik, Imed Hammouda

Charles M. Schweik

Papers accepted (and revised) by doctoral students who participated in the Open Source Systems (OSS) 2012 Doctoral Consortium, Hammamet, Tunisia


Enterprise Systems Manager, Edward Aractingi 2012 Marshall University

Enterprise Systems Manager, Edward Aractingi

Edward Aractingi

Presentation on the need of remote systems administration.


Linux 101: Ci-Trainseminar, Edward Aractingi 2012 Marshall University

Linux 101: Ci-Trainseminar, Edward Aractingi

Edward Aractingi

An overview of how the Linux operating system.


Student Interactive Campus Map At Marshall University, Edward Aractingi, Jamie Wolfe 2012 Marshall University

Student Interactive Campus Map At Marshall University, Edward Aractingi, Jamie Wolfe

Edward Aractingi

Marshall University is a state-funded university in Huntington, West Virginia. Like many universities, it is a large organization with multiple and diverse units (colleges, departments, centers, etc.) and depends on data to run efficiently. Much of this data is used by multiple entities. To better manage the needed data collected by the university, the Marshall University Geographic Information System (MUGIS) has been developed. MUGIS will address several needs of Marshall University’s principal stakeholders. Stakeholders include the university administration, faculty, and students. One of the first applications developed for MUGIS was an interactive campus map. This Web-based application is intended to …


Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs 2012 Marshall University

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

Edward Aractingi

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs 2012 Marshall University

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

Allen Taylor

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


Recent Advances In Integrating Owl And Rules, Matthias Knorr, David Carral Martinez, Pascal Hitzler, Adila A. Krisnadhi, Frederick Maier, Cong Wang 2012 Wright State University - Main Campus

Recent Advances In Integrating Owl And Rules, Matthias Knorr, David Carral Martinez, Pascal Hitzler, Adila A. Krisnadhi, Frederick Maier, Cong Wang

Computer Science and Engineering Faculty Publications

As part of the quest for a unifying logic for the Semantic Web Technology Stack, a central issue is finding suitable ways of integrating description logics based on the Web Ontology Language (OWL) with rule-based approaches based on logic programming. Such integration is difficult since naive approaches typically result in the violation of one or more desirable design principles. For example, while both OWL 2 DL and RIF Core (a dialect of the Rule Interchange Format RIF) are decidable, their naive union is not, unless carefully chosen syntactic restrictions are applied.

We report on recent advances and ongoing work by …


A Tableau Algorithm For Description Logics With Nominal Schema, Adila Krisnadhi, Pascal Hitzler 2012 Wright State University - Main Campus

A Tableau Algorithm For Description Logics With Nominal Schema, Adila Krisnadhi, Pascal Hitzler

Computer Science and Engineering Faculty Publications

We present a tableau algorithm for the description logic ALCOV. This description logic is obtained by extending the description logic ALCO with the expressive nominal schema construct that enables DL-safe datalog with predicates of arbitrary arity to be covered within the description logic framework. The tableau algorithm provides a basis to implement a delayed grounding strategy which was not facilitated by earlier versions of decision procedures for satisfiability in expressive description logics with nominal schemas.


Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams 2012 University of Dayton

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

MIS/OM/DS Faculty Publications

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


Guest Editors’ Introduction: Methods Innovations For The Empirical Study Of Technology Adoption And Diffusion, Robert John KAUFFMAN, Angsana A. TECHATASSANASOONTORN 2012 Singapore Management University

Guest Editors’ Introduction: Methods Innovations For The Empirical Study Of Technology Adoption And Diffusion, Robert John Kauffman, Angsana A. Techatassanasoontorn

Research Collection School Of Computing and Information Systems

The literature on technology adoption and diffusion is ahighly mature area of Information Systems (IS) research,which requires a deft hand in research to support the creationof new contributions of knowledge. In this specialissue, we focus on the application of various methods,including new ones, to shed light on research questions thathave not been understood fully in prior research. In particular,we will showcase research that involves theapplication of event history analysis and spatial econometrics,as well as count data models to study frequencyrelatedphenomena for changes and development in technologyadoption and diffusion. We also include an articlethat employs game theory, as well as another …


In-Game Action List Segmentation And Labeling In Real-Time Strategy Games, Wei GONG, Ee-Peng LIM, Palakorn ACHANANUPARP, Feida ZHU, David LO, Freddy Chong-Tat CHUA 2012 Singapore Management University

In-Game Action List Segmentation And Labeling In Real-Time Strategy Games, Wei Gong, Ee-Peng Lim, Palakorn Achananuparp, Feida Zhu, David Lo, Freddy Chong-Tat Chua

Research Collection School Of Computing and Information Systems

In-game actions of real-time strategy (RTS) games are extremely useful in determining the players' strategies, analyzing their behaviors and recommending ways to improve their play skills. Unfortunately, unstructured sequences of in-game actions are hardly informative enough for these analyses. The inconsistency we observed in human annotation of in-game data makes the analytical task even more challenging. In this paper, we propose an integrated system for in-game action segmentation and semantic label assignment based on a Conditional Random Fields (CRFs) model with essential features extracted from the in-game actions. Our experiments demonstrate that the accuracy of our solution can be as …


Bduol: Double Updating Online Learning On A Fixed Budget, Peilin ZHAO, Steven C. H. HOI 2012 Nanyang Technological University

Bduol: Double Updating Online Learning On A Fixed Budget, Peilin Zhao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Kernel-based online learning often exhibits promising empirical performance for various applications according to previous studies. However, it often suffers a main shortcoming, that is, the unbounded number of support vectors, making it unsuitable for handling large-scale datasets. In this paper, we investigate the problem of budget kernel-based online learning that aims to constrain the number of support vectors by a predefined budget when learning the kernel-based prediction function in the online learning process. Unlike the existing studies, we present a new framework of budget kernel-based online learning based on a recently proposed online learning method called “Double Updating Online Learning” …


Analysis Of Median Household Income Differences Between Election Day-Vbm And Eip Voters, Mark Salling, Norman Robbins 2012 Cleveland State University

Analysis Of Median Household Income Differences Between Election Day-Vbm And Eip Voters, Mark Salling, Norman Robbins

All Maxine Goodman Levin School of Urban Affairs Publications

Analysis of early in-person (EIP) voting in 2008 in Cuyahoga County shows that African-American, white, and Hispanic voters who used EIP voting had significantly lower incomes than members of those same groups who voted on election day or by mail. This result applies to those voting EIP on weekdays, extended weekday hours, weekends, and the three days before election day.


Reconciling Owl And Non-Monotonic Rules For The Semantic Web, Matthias Knorr, Pascal Hitzler, Frederick Maier 2012 Wright State University - Main Campus

Reconciling Owl And Non-Monotonic Rules For The Semantic Web, Matthias Knorr, Pascal Hitzler, Frederick Maier

Computer Science and Engineering Faculty Publications

We propose a description logic extending SROIQ (the description logic underlying OWL 2 DL) and at the same time encompassing some of the most prominent monotonic and nonmonotonic rule languages, in particular Datalog extended with the answer set semantics. Our proposal could be considered a substantial contribution towards fulfilling the quest for a unifying logic for the Semantic Web. As a case in point, two non-monotonic extensions of description logics considered to be of distinct expressiveness until now are covered in our proposal. In contrast to earlier such proposals, our language has the 'look and feel' of a description logic …


Digital Commons powered by bepress